Google discovered North Korea exploiting an Internet Explorer zero-day vulnerability in October


The Internet Explorer web browser was officially retired back in June earlier this year and has since been replaced by Microsoft Edge. However, as their technical analysis explains, Office is still using the IE engine to execute the JavaScript that enables the attack, which is why it worked on Windows 7 through 11 and Windows Server 2008 through 2022 machines that haven’t installed new November 2022 security updates.
TAG became aware of the vulnerability when the malicious Microsoft Office documents titled “221031 Seoul Yongsan Itaewon accident response situation (06:00).docx” were uploaded to VirusTotal on October 31, 2022. The documents took advantage of widespread publicity over the tragedy in Itaewon on October 29th, in which 151 people lost their lives in a crowd crush during a Halloween celebration in Seoul.
The attack is believed to be the work of a group of North Korean government-backed actors known as APT37
The document exploited an Internet Explorer 0-day vulnerability found within “jscript9.dll”, the JavaScript engine of Internet Explorer, which could be used to deliver malware or malicious code when rendering a website controlled by the attacker. TAG attributes the attack to a group of North Korean government-backed actors known as APT37, which has previously used similar Internet Explorer 0-day exploits in targeted attacks against, North Korean defectors, policymakers, journalists, human rights activists, and South Korean IE users in general.
TAG says within the blog post that it “did not recover a final payload for this campaign,” but notes that it previously observed APT37 using similar exploits to deliver malware such as ROKRAT, BLUELIGHT, and DOLPHIN. In this instance, the vulnerability was reported to Microsoft within hours of its discovery on October 31st and was patched out on November 8th.
The Internet Explorer web browser was officially retired back in June earlier this year and has since been replaced by Microsoft Edge. However, as their technical analysis explains, Office is still using the IE engine to execute the JavaScript that enables the attack, which is why it worked on Windows…
Recent Posts
- Severance opens up a new kind of terror in latest episode
- The OLED TV I want to buy in 2025 is last year’s LG C4 – here’s why
- DJI’s drone-in-a-box can now launch from moving vehicles
- Best iPad Accessories (2025), Tested and Reviewed
- We might have our first look at the Samsung Galaxy Z Flip 7, but I can’t tell the difference from the Z Flip 6
Archives
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010